SYMBOLCOMMON_NAMEaka. SYNONYMS
win.rhadamanthys (Back to overview)

Rhadamanthys

Actor(s): Sandworm

VTCollection    

According to PCrisk, Rhadamanthys is a stealer-type malware, and as its name implies - it is designed to extract data from infected machines.

At the time of writing, this malware is spread through malicious websites mirroring those of genuine software such as AnyDesk, Zoom, Notepad++, and others. Rhadamanthys is downloaded alongside the real program, thus diminishing immediate user suspicion. These sites were promoted through Google ads, which superseded the legitimate search results on the Google search engine.

References
2026-01-13SpamhausSpamhaus Malware Labs
Spamhaus Botnet Threat Update July to December 2025
Coper FluBot Joker Aisuru Mirai AsyncRAT BianLian Cobalt Strike DCRat Havoc Latrodectus PureLogs Stealer Quasar RAT Remcos Rhadamanthys Sliver ValleyRAT Venom RAT Vidar XWorm
2025-12-10SpyCloudSpyCloud Labs Research Team
Analyzing the Impact of the Operation Endgame Takedown on Rhadamanthys & the MaaS Ecosystem
Rhadamanthys
2025-11-13Politie NLPolitie NL
Again criminal infrastructure dismantled in international ransomware operation
Rhadamanthys Venom RAT
2025-10-01Checkpointhasherezade
Rhadamanthys 0.9.x – walk through the updates
Rhadamanthys
2025-08-08AhnLabAhnLab ASEC Analysis Team
Distribution of SmartLoader Malware via Github Repository Disguised as a Legitimate Project
Rhadamanthys SmartLoader
2025-07-31Twitter (@Threatlabz)Zscaler
Tweet about new variant with BEEF instead of !RHA as config magic bytes
Rhadamanthys
2025-07-14SpamhausSpamhaus Malware Labs
Spamhaus Botnet Threat Update January to June 2025
Coper FluBot Hook Joker Mirai AsyncRAT BianLian BumbleBee Chaos Cobalt Strike DanaBot DCRat Havoc Latrodectus NjRAT Quasar RAT RedLine Stealer Remcos Rhadamanthys Sliver ValleyRAT WarmCookie XWorm
2025-06-03VMRayAlbert Zsigovits, VMRay
Rhadamanthys slips through in large installer files
Rhadamanthys
2025-05-22ElasticDaniel Stepanic
De-obfuscating ALCATRAZ
DOUBLELOADER Rhadamanthys
2025-03-28Trend MicroAhmed Mohamed Ibrahim, Aliakbar Zahravi
A Deep Dive into Water Gamayun’s Arsenal and Infrastructure
DarkWisp SilentPrism Kematian Stealer Rhadamanthys Stealc Water Gamayun
2025-03-14Twitter (@CERTCyberdef)Alexandre Matousek, Marine PICHON
Tweet on Emmenhtal v3
Emmenhtal Lumma Stealer Rhadamanthys
2025-03-06Outpost24KrakenLabs
Unveiling EncryptHub: Analysis of a multi-stage malware campaign
Rhadamanthys
2025-01-10SpamhausSpamhaus Malware Labs
Spamhaus Botnet Threat Update July to December 2024
Coper FluBot Hook Mirai FAKEUPDATES AsyncRAT BianLian Brute Ratel C4 Cobalt Strike DanaBot DCRat Havoc Latrodectus NjRAT Quasar RAT RedLine Stealer Remcos Rhadamanthys Sliver Stealc
2025-01-04revdiaries.comheapoverflow
"Solara" Roblox Executor Malware
Rhadamanthys
2024-11-06Check Point ResearchCheck Point Research
CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits
Rhadamanthys
2024-10-23Cisco TalosEdmund Brumaghin, Holger Unterbrink, Jordyn Dunk, Nicole Hoffman
Highlighting TA866/Asylum Ambuscade Activity Since 2021
WasabiSeed Cobalt Strike csharp-streamer RAT Resident Rhadamanthys WarmCookie
2024-10-17SekoiaQuentin Bourgue, Sekoia TDR
ClickFix tactic: The Phantom Meet
Rhadamanthys Stealc
2024-09-26Recorded FutureInsikt Group
Rhadamanthys Stealer Adds Innovative AI Feature in Version 0.7.0
Rhadamanthys
2024-07-25SymantecSymantec
Growing Number of Threats Leveraging AI
Broomstick DBatLoader NetSupportManager RAT Rhadamanthys
2024-07-24Check Point ResearchAntonis Terefos
Stargazers Ghost Network
Atlantida Lumma Stealer RedLine Stealer Rhadamanthys RisePro Stargazer Goblin
2024-07-14Medium b.magnezi0xMrMagnezi
Malware Analysis - Rhadamanthys
Rhadamanthys
2024-07-09SpamhausSpamhaus Malware Labs
Spamhaus Botnet Threat Update January to June 2024
Coper FluBot Hook Bashlite Mirai FAKEUPDATES AsyncRAT BianLian Cobalt Strike DCRat Havoc NjRAT QakBot Quasar RAT RedLine Stealer Remcos Rhadamanthys RisePro Sliver
2024-06-17Recorded FutureInsikt Group
The Travels of “markopolo”: Self-Proclaimed Meeting Software Vortax Spreads Infostealers, Unveils Expansive Network of Malicious macOS Applications
AMOS Rhadamanthys Stealc Markopolo
2024-04-10ProofpointSelena Larson, Tommy Madjar
Security Brief: TA547 Targets German Organizations with Rhadamanthys Stealer
Rhadamanthys
2024-01-12SpamhausSpamhaus Malware Labs
Spamhaus Botnet Threat Update Q4 2023
FluBot Hook FAKEUPDATES AsyncRAT BianLian Cobalt Strike DCRat Havoc IcedID Lumma Stealer Meterpreter NjRAT Pikabot QakBot Quasar RAT RecordBreaker RedLine Stealer Remcos Rhadamanthys Sliver
2023-12-14Checkpointhasherezade
Rhadamanthys v0.5.0 – A Deep Dive into the Stealer’s Components
Rhadamanthys
2023-10-27ElasticJoe Desimone, Salim Bitam
GHOSTPULSE haunts victims using defense evasion bag o' tricks
HijackLoader Lumma Stealer NetSupportManager RAT Rhadamanthys SectopRAT Vidar
2023-10-12SpamhausSpamhaus Malware Labs
Spamhaus Botnet Threat Update Q3 2023
FluBot AsyncRAT Ave Maria Cobalt Strike DCRat Havoc IcedID ISFB Nanocore RAT NjRAT QakBot Quasar RAT RecordBreaker RedLine Stealer Remcos Rhadamanthys Sliver Stealc Tofsee Vidar
2023-10-03Outpost24David Catalan
Rhadamanthys malware analysis: How infostealers use VMs to avoid analysis
Rhadamanthys
2023-09-25EchoCTIBilal BAKARTEPE, bixploit
Rhdamanthys Technical Analysis Report
Rhadamanthys
2023-08-31Checkpointhasherezade
From Hidden Bee to Rhadamanthys - The Evolution of Custom Executable Formats
Hidden Bee Rhadamanthys
2023-07-11SpamhausSpamhaus Malware Labs
Spamhaus Botnet Threat Update Q2 2023
Hydra AsyncRAT Aurora Stealer Ave Maria BumbleBee Cobalt Strike DCRat Havoc IcedID ISFB NjRAT QakBot Quasar RAT RecordBreaker RedLine Stealer Remcos Rhadamanthys Sliver Tofsee
2023-06-15eSentireRussianPanda
eSentire Threat Intelligence Malware Analysis: Resident Campaign
Cobalt Strike Resident Rhadamanthys WarmCookie
2023-05-16SecureworksCounter Threat Unit ResearchTeam
The Growing Threat from Infostealers
Graphiron GraphSteel Raccoon RedLine Stealer Rhadamanthys Taurus Stealer Vidar
2023-04-19GoogleBilly Leonard, Google Threat Analysis Group
Ukraine remains Russia’s biggest cyber focus in 2023
Rhadamanthys
2023-04-12SpamhausSpamhaus Malware Labs
Spamhaus Botnet Threat Update Q1 2023
FluBot Amadey AsyncRAT Aurora Ave Maria BumbleBee Cobalt Strike DCRat Emotet IcedID ISFB NjRAT QakBot RecordBreaker RedLine Stealer Remcos Rhadamanthys Sliver Tofsee Vidar
2023-03-27Check Point ResearchCheckpoint Research
Rhadamanthys: The “Everything Bagel” Infostealer
Rhadamanthys
2023-02-21ZscalerNikolaos Pantazopoulos, Sarthak Misraa
Technical Analysis of Rhadamanthys Obfuscation Techniques
Rhadamanthys
2023-01-16Medium elis531989Eli Salem
Dancing With Shellcodes: Analyzing Rhadamanthys Stealer
Rhadamanthys
2023-01-12CybleincCyble
Rhadamanthys: New Stealer Spreading Through Google Ads
Rhadamanthys
2023-01-03Malware Traffic AnalysisBrad Duncan
2023-01-03 (TUESDAY) - GOOGLE AD --> FAKE NOTPAD++ PAGE --> RHADAMANTHYS STEALER
Rhadamanthys
2022-12-05AccenturePaul Mansfield, Thomas Willkan
Popularity spikes for information stealer malware on the dark web
MetaStealer Rhadamanthys
2022-10-06ThreatMonThreatMon Malware Research Team
Rhadamanthys Stealer Analysis
Rhadamanthys
Yara Rules
[TLP:WHITE] win_rhadamanthys_auto (20251219 | Detects win.rhadamanthys.)
rule win_rhadamanthys_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2026-01-05"
        version = "1"
        description = "Detects win.rhadamanthys."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.rhadamanthys"
        malpedia_rule_date = "20260105"
        malpedia_hash = "19b79e7cab4eaf532122e5b45a77dd8f6bb5cc79"
        malpedia_version = "20251219"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { ff7308 03c6 50 8b03 }
            // n = 4, score = 200
            //   ff7308               | push                dword ptr [ebx + 8]
            //   03c6                 | add                 eax, esi
            //   50                   | push                eax
            //   8b03                 | mov                 eax, dword ptr [ebx]

        $sequence_1 = { 8a01 84c0 7416 8b542408 69d293010001 }
            // n = 5, score = 200
            //   8a01                 | mov                 al, byte ptr [ecx]
            //   84c0                 | test                al, al
            //   7416                 | je                  0x18
            //   8b542408             | mov                 edx, dword ptr [esp + 8]
            //   69d293010001         | imul                edx, edx, 0x1000193

        $sequence_2 = { 33d0 41 89542408 ebe4 }
            // n = 4, score = 200
            //   33d0                 | xor                 edx, eax
            //   41                   | inc                 ecx
            //   89542408             | mov                 dword ptr [esp + 8], edx
            //   ebe4                 | jmp                 0xffffffe6

        $sequence_3 = { 7416 8b542408 69d293010001 0fb6c0 33d0 41 }
            // n = 6, score = 200
            //   7416                 | je                  0x18
            //   8b542408             | mov                 edx, dword ptr [esp + 8]
            //   69d293010001         | imul                edx, edx, 0x1000193
            //   0fb6c0               | movzx               eax, al
            //   33d0                 | xor                 edx, eax
            //   41                   | inc                 ecx

        $sequence_4 = { 8b542408 69d293010001 0fb6c0 33d0 41 89542408 ebe4 }
            // n = 7, score = 200
            //   8b542408             | mov                 edx, dword ptr [esp + 8]
            //   69d293010001         | imul                edx, edx, 0x1000193
            //   0fb6c0               | movzx               eax, al
            //   33d0                 | xor                 edx, eax
            //   41                   | inc                 ecx
            //   89542408             | mov                 dword ptr [esp + 8], edx
            //   ebe4                 | jmp                 0xffffffe6

        $sequence_5 = { 7416 8b542408 69d293010001 0fb6c0 33d0 }
            // n = 5, score = 200
            //   7416                 | je                  0x18
            //   8b542408             | mov                 edx, dword ptr [esp + 8]
            //   69d293010001         | imul                edx, edx, 0x1000193
            //   0fb6c0               | movzx               eax, al
            //   33d0                 | xor                 edx, eax

        $sequence_6 = { 84c0 7416 8b542408 69d293010001 0fb6c0 }
            // n = 5, score = 200
            //   84c0                 | test                al, al
            //   7416                 | je                  0x18
            //   8b542408             | mov                 edx, dword ptr [esp + 8]
            //   69d293010001         | imul                edx, edx, 0x1000193
            //   0fb6c0               | movzx               eax, al

        $sequence_7 = { 7416 8b542408 69d293010001 0fb6c0 33d0 41 89542408 }
            // n = 7, score = 200
            //   7416                 | je                  0x18
            //   8b542408             | mov                 edx, dword ptr [esp + 8]
            //   69d293010001         | imul                edx, edx, 0x1000193
            //   0fb6c0               | movzx               eax, al
            //   33d0                 | xor                 edx, eax
            //   41                   | inc                 ecx
            //   89542408             | mov                 dword ptr [esp + 8], edx

        $sequence_8 = { 84c0 7416 8b542408 69d293010001 0fb6c0 33d0 }
            // n = 6, score = 200
            //   84c0                 | test                al, al
            //   7416                 | je                  0x18
            //   8b542408             | mov                 edx, dword ptr [esp + 8]
            //   69d293010001         | imul                edx, edx, 0x1000193
            //   0fb6c0               | movzx               eax, al
            //   33d0                 | xor                 edx, eax

        $sequence_9 = { 84c0 7416 8b542408 69d293010001 }
            // n = 4, score = 200
            //   84c0                 | test                al, al
            //   7416                 | je                  0x18
            //   8b542408             | mov                 edx, dword ptr [esp + 8]
            //   69d293010001         | imul                edx, edx, 0x1000193

    condition:
        7 of them and filesize < 1111040
}
Download all Yara Rules